ds ch 7, ch 8 T
A Trojan horse is a software program that appears to be benign but then does something other than expected.
t
Biometric authentication is the use of physical characteristics such as retinal images to provide identification.
t
Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.
t
Computer worms spread much more rapidly than computer viruses.
t
Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up.
t
Fiber-optic cable is more expensive and harder to install than wire media.
t
In a client/server network, a network server provides every connected client with an address so it can be found by others on the network.
t
In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.
t
Mobile devices are not targeted as extensively by malware as traditional computer
t
Mobile search makes up 20% of all Internet searches.
t
NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.
t
One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
t
Public key encryption uses two keys.
t
SSL is a protocol used to establish a secure connection between two computers.
t
Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.
t
Telephone networks are fundamentally different from computer networks.
t
Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.
t
Unauthorized access is a security challenge that is most likely to occur in a network at the point of client computers.
t
Viruses can be spread through e-mail.
t
VoIP technology delivers voice information in digital form using packet switching.
t
Web 3.0 is an effort to add a layer of meaning to the existing Web in order to reduce the amount of human involvement in searching for and processing Web information.
t
Wikis allow visitors to change or add to the original posted material.
t
Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.
t
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
t